Remove Accountability Remove Book Remove Scams Remove Social Engineering
article thumbnail

Lessons from a Scam Artist

Security Through Education

What does a government scam, an IT support scam and a romance scam have in common? They all use psychology and social engineering skills to convince their victims to take an action that is detrimental to them. Let’s see what lessons we can learn from scam artists to better protect ourselves.

Scams 122
article thumbnail

Fla. Man Charged in SIM-Swapping Spree is Key Suspect in Hacker Groups Oktapus, Scattered Spider

Krebs on Security

In each attack, the victims saw their email and financial accounts compromised after suffering an unauthorized SIM-swap, wherein attackers transferred each victim’s mobile phone number to a new device that they controlled. A booking photo of Noah Michael Urban released by the Volusia County Sheriff. Twilio disclosed in Aug.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Plane sailing for ticket scammers: How to keep your flight plans safe

Malwarebytes

Several trip-related scams are doing the rounds right now, and we’re going to highlight some of the more prevalent ones. Fake customer support on social media is one current major area of concern. There’s currently somewhere in the realm of 100+ Twitter accounts using the easyJet branding.

article thumbnail

Craft fair vendors targeted by fake event scammers on Facebook

Malwarebytes

A real world scam which sucks the fun out of craft fairs has caused nothing but stress for victims. You’re given a link to a booking form for more information, and asked for payment via PayPal or similar methods. This isn’t an isolated case; this specific scam targeted people all across the UK. You’re a small business owner.

Scams 120
article thumbnail

“My Slice”, an Italian adaptive phishing campaign

Security Affairs

In an adaptive phishing campaign, attackers gather specific information about victims through various sources, such as social media, public websites, and previous data breaches. One of the key elements of these campaigns is social engineering, which aims to psychologically manipulate victims.

Phishing 105
article thumbnail

MY TAKE: What NortonLifeLock’s $8 billion buyout of Avast portends for consumer security

The Last Watchdog

This deal reads like to the epilogue to a book titled The First 20 Years of the Supremely Lucrative Antivirus Market. There are simple steps consumers can take today, for free, to lower their overall risk of a cyber attack, including using multi-factor authentication for their accounts and using strong passwords.

Antivirus 223
article thumbnail

Black Friday 2021: How to Have a Scam-Free Shopping Day

SecureList

Case in point: we’re already seeing scams targeting World Cup fans more than a year out from the event. Phishing is one of the oldest tricks in the book, precisely because it’s easy and often successful — particularly when users are in a rush to benefit from a deal that sounds too good to be true. Phishing for data.

Scams 93